Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe 5. June 2018
|
|
- Hugh Armstrong
- 6 years ago
- Views:
Transcription
1 Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe martin.grossen@avnet.eu 5. June 2018
2 Prepare for the 2nd wave of Digital Transformation Wave 1: The Microcontroller (MCU) Wave 2: Internet Connectivity 1970 s 1980 s 1990 s 2000 s 2010 s 2020 s 2030 s 03-Jun-18 2
3 Manufacturers have a compelling desire to build connected MCU-based devices How does a consumer know the compressor in their fridge needs to be replaced? Option 1 Melted ice cream and spoiled milk Option 2 Message that a technician with replacement compressor will arrive tonight Connected devices create profoundly better customer experiences
4 October 21, 2016 Botnet Attack Observations Device Security is a socioeconomic concern DAY 1 the attack is Technology headline in NY Times DAY 2 the attack is Politics headline Future attacks could be much larger This attack was small; just 100K devices Imagine a 100M-device attack Future attacks could create huge liability exposure Hackers could brick an entire product line in a day Actuating devices could cause property damage or loss of life The industry response to date is inadequate For example, network vendors offer to turn off network ports The attack exploited well-known weaknesses Weak common passwords, no early detection, no remote update, etc
5 The danger is real, especially for IoT devices The Mirai Botnet (aka Dyn Attack), Oct 2016: Largest IoT DDoS attack. Large portions of the internet going down, including Twitter, the Guardian, Netflix, Reddit and CNN. Affected devices: Webcams and DVR players. The Jeep Hack, July 2015: A team of researchers was able to take total control of a Jeep SUV by exploiting a firmware update vulnerability. The TRENDnet Webcam Hack, Jan Access to camera and microphone over TCP/IP. The Hackable Cardiac Device from St.Jude, Jan. 2017: The vulnerability provided access to drain the battery, change heartbeat pace and to trigger shocks. The Printer Hack to catch fire, Nov. 2011: Made the fuser overheat, causing the paper in the printer to catch fire. 5
6 The internet security battle Microsoft has been fighting it for decades so they have some experience to share. Also on hardware side! Example X-BOX: XBOX: Hacked within weeks -> Standard Intel x86 system XBOX 360:Hacked within 3,5 month -> HW hack to compromise the bus: XBOX One: Not hacked until today -> also thanks to in-chip bus firewalls 6
7 Highly-secured connected devices require 7 properties Hardware Root of Trust Is your device s identity and software integrity secured by hardware? Defense in Depth Does your device remain protected if a security mechanism is defeated? Small Trusted Computing Base Is your device s TCB protected from bugs in other code? Dynamic Compartments Certificate-Based Authentication Failure Reporting Renewable Security Can your device s security protections improve after deployment? Does your device use certificates instead of passwords for authentication? Does your device report back about failures and anomalies? Does your device s software update automatically? = Silicon support required = OS support required = Cloud Service support required
8 Azure Sphere is and end-to-end solution for creating highlysecured, connected MCU devices Secured MCUs A new class of crossover Azure Sphere MCUs, from our silicon partners, with built-in Microsoft security technology provide connectivity, high performance, and a secured hardware root of trust. Secured Operating System The highly-secured Azure Sphere IoT OS combines the best of Microsoft and OSS technologies to create a trustworthy platform for new IoT experiences Secured by our Cloud Service The Azure Sphere Security Service guards every Azure Sphere device; it protects your devices and customers, detects emerging threats, and proactively responds.
9 Azure Sphere: Technology and Solution Overview
10 So what is Azure Sphere exactly? Azure Sphere is not a single chip but a security solution / technology built with a combination of a special mirocontroller, a special operating system and the corresponding cloud services Azure Sphere is a highvalue, cost effective solution, secured by Microsoft. The solution today contains: Azure Sphere Chip MT3620 Azure Sphere Security Services for 10 years Azure Sphere IoT OS with 10 years of on-device updates
11 Today, only Azure Sphere provides all 7 Properties for secured IoT Chip OS& Service Hardware Root of Trust Defense in Depth Small TCB Dynamic Compartments Certificate-based Auth. Failure Reporting Renewable Security MT3620 Azure Sphere Espressif ESP32 RTOS &? Marvell 88MW300/2 RTOS &? Qualcomm QCA4010 RTOS &? Broadcom BCM43907 RTOS &? TI CC3220x RTOS &? = Full, Partial, or No Silicon support = Full, Partial, or No OS support = Full, Partial, or No Cloud Security Service support
12 Azure Sphere History Project started in 2014 in Microsoft Research, now part of AI&R division Started working on prototype chip and OS in 2015 Established seven properties of highly secured devices Ran a security challenge based on prototype chip and OS in 2017 Actively working with partners and customers for production in 2018 Hardware Root of Trust Defense in Depth Small Trusted Computing Base Dynamic Compartments Certificate-Based Authentication Failure Reporting Renewable Security
13 Azure Sphere: The chip MT3620
14 Azure Spheres MCU s - Create a secured foundation for intelligent edge devices Secured With built-in Microsoft security technology i.e. I/O bus firewalls including the Pluton Security Subsystem Microsoft Pluton security subsystem Firewall Firewall FLASH 4MB Firewall Firewall Network Connection WiFi in first chip Firewall Performance With built-in Cortex-A7 processors Delivers significantly greater performance vs. similar traditional MCU ARM ARM Cortex-A Cortex-A optimized optimized for for low power low power Firewall Firewall SRAM 4MB Firewall Multiplexed I/O Firewall ARM Cortex-M(s) for real time processing Firewall Connected With built-in networking GPIO PWM TDM I2S UART I2C SPI ADC
15 MT3620 Block Diagram
16 Device Development using the MT3620
17 Device Development Options Use a module Use the chip directly and solder to PCB
18 Azure Sphere Silicon Partners to implement the Pluton Security Core Microsoft is working with other suppliers to implement the Azure Sphere Pluton Security Core into their HW:
19 Azure Sphere: The Operating System
20 Azure Sphere IoT OS: Unequalled security and agility Azure Sphere OS Architecture OS Layer 4 App Containers for POSIX (on Cortex-A) App Containers for I/O (on Cortex-Ms) Secure Application Containers Compartmentalize code for agility, robustness & security OS Layer 3 OS Layer 2 OS Layer 1 On-chip Cloud Services Secure HLOS Kernel Security Picovisor On-chip Cloud Services Provide update, authentication, and connectivity Secured HLOS Kernel Empowers agile silicon evolution and reuse of code Security Picovisor Guards integrity and access to critical resources Hardware Azure Sphere MCUs
21 I/O App Runtime Peripherals (e.g. UART, GPIO, etc.) OS Services Posix App Runtime Azure Sphere IoT OS: Basic Architecture Developer Experience (on PC) Board / Module Azure Sphere SoC Visual Studio Integration Cortex-A core Customer POSIX App Connectivity Solution Vendor Firmware Azure Sphere SDK Azure Sphere Device Communication Service Runtime for POSIX Apps (e.g. Base C API; Azure IoT; HTTP client; UART, GPIO APIs, etc.) Application Container Pluton Security Subsystem Pluton Security Subsystem Architectural Layers Customer Applications OS Services Custom Linux Kernel Picovisor & Firmware Networking management Application management OTA update client Device AuthN client User Mode Supervisor Mode Custom Linux Kernel Security Picovisor Cortex-M: I/O core(s) Customer I/O App Library for I/O Apps (e.g. inter-core comms, etc.) RTOS / Runtime
22 Azure Sphere: The Cloud Services
23 Azure Sphere Cloud Security Service The Azure Sphere Security Service guards every Azure Sphere device. It renews security, identifies emerging threats, and brokers trust between device, cloud, and other endpoints. Protecting devices with certificate-based authentication Guaranteeing device authenticity and running only your genuine software Getting insight into device and application failure and visibility into emerging threats Deploys app updates to your Azure Sphere powered devices
24 Azure Sphere: The Software Development
25 Azure Sphere and Visual Studio enhance your productivity Simplify Development Focus your device development effort on the value you want to create Accelerate Deployment Bring the power of automation to your development experience Streamline Debugging Experience interactive, context-aware debugging across device and cloud Connect your Developers Apply tool-assisted collaboration across your entire development organization
26 Azure Sphere development tools Device PC App Static Libs Azure Sphere SDK CLIs Compiler, Headers, etc Cloud
27 Azure Sphere: The Development Board
28 MT3620 Development Board MT3620 FT4232HQ Micro USB socket
29 Open Source Reference Design Schematic PCB layout 3D CAD models Currently available in Altium Designer format
30 Azure Sphere: Live Demo
31 Azure Sphere Live Demo Prerequisite You need following prerequisite to run this live demo on the Azure Sphere development board: - Installed Visual Studio 2017 version 15.3 or later - Installed Azure Sphere SDK and Tools version Configured all drivers and network settings per description in SDK/Tool documentation - Updated Azure Sphere development board with firmware Claimed and assigned Azure Sphere development board under your AAD (cutil.exe) - Configured WiFi (dutil.exe) - Connected Azure Sphere development board via USB to Computer - Connected Azure Sphere development via WiFi - Azure Subscription with a running IoT Hub in
32 Azure Sphere Live Demo: Visual Studio 2017 Start Visual Studio 2017, create new project: File -> New -> Project
33 Azure Sphere Live Demo: Visual Studio 2017 Select: Visual C++ -> Cross Platform -> Azure Sphere
34 Azure Sphere Live Demo: Visual Studio 2017 In Solution Explorer, add a new connected service with right mouse click on References
35 Azure Sphere Live Demo: Visual Studio 2017 Under Connected services choose Azure IoT Hub
36 Azure Sphere Live Demo: Visual Studio 2017 Under Connect, select your Azure subscription running the IoT Hub
37 Azure Sphere Live Demo: Visual Studio 2017 Under Connect, select your Azure subscription running the IoT Hub
38 Azure Sphere Live Demo: Visual Studio 2017 Under IoT Hub, select the running IoT Hub you want to use for this demo
39 Azure Sphere Live Demo: Visual Studio 2017 Under Device, select your device
40 Azure Sphere Live Demo: Visual Studio 2017 If the device was never connected, you have to create a new device with a new name
41 Azure Sphere Live Demo: Visual Studio 2017 Under Summary, click Finish
42 Azure Sphere Live Demo: Visual Studio 2017 This has added the azure_iot_hub.h and azure_iot_hub.c into your solution
43 Azure Sphere Live Demo: Visual Studio 2017 In main.c, find the #error tag and delete this comment out of the code (line 60, 61 & 62)
44 Azure Sphere Live Demo: Visual Studio 2017 Under Debug, Start Debugging or press F5. If never built before, you will be asked to build first
45 Azure Sphere Live Demo: Visual Studio 2017 In Device Output Windows, you will see the output from the GPIO-, WiFi- and AzureIoTHub API
46 Azure Sphere Live Demo: Visual Studio 2017 AzureIoTHub API is submitting states every 10 seconds
47 Azure Sphere Live Demo: Visual Studio 2017 Log into the Azure Portal where the IoT Hub is running and click on the IoT Hub resource
48 Azure Sphere Live Demo: Visual Studio 2017 In the IoT Hub, click on IoT devices
49 Azure Sphere Live Demo: Visual Studio 2017 In IoT devices, click on the name of the Azure Sphere development board
50 Azure Sphere Live Demo: Visual Studio 2017 In Device Details, click on Device Twin
51 Azure Sphere Live Demo: Visual Studio 2017 Scroll down in the device twin JSON file and find the reported blink rate and version number
52 Azure Sphere Live Demo: Visual Studio 2017 Press button A on the device and Refresh the Device Twin: Rate and Version has changed
53 Azure Sphere Live Demo: Visual Studio 2017 Back in Device Details, click on Message To Device
54 Azure Sphere Live Demo: Visual Studio 2017 Type in a message to the device in the Message Body and click Send Message
55 Azure Sphere Live Demo: Visual Studio 2017 AzureIoTHub API is prompting message from IoT Hub in the Visual Studio Output Window
56 Azure Sphere: The new security technology
57 Azure Sphere is Open Open Chips MCU manufacturer are free to license (without royalty) the security chip kernel Pluton for use in any chip whether or not it uses our OS or cloud * Open Kernel MCU manufacturers are free to innovate with our GPL d HLOS kernel code base Open Cloud Azure Sphere devices are free to connect to Azure or any other cloud, proprietary or public Open Data Your data belongs to you. Azure Sphere secures your data connections, but we never see your data Open Development Device manufacturers are free to use Visual Studio or any other development tools with Azure Sphere * Azure Sphere branding requires a Azure Sphere chip with an Azure Sphere OS and Azure Sphere Security Services
58 What is the value add from AVNET Silica? AVNET was selected on a worldwide base as the exclusive distributor for the Azure Sphere technology. AVNET Silica is driving Azure Sphere in Europe. What we offer Advisory services Product & solution design Embedded / IoT licensing Technical trainings Integration services Cloud & digital services Supply chain services Logistics Azure Sphere document package: You have to register first to get the document links by
59 What is the Advantage from AVNET Silica on the Azure side? AVNET Silica is a Microsoft CSP (Cloud Solution Provider) for industrial applications No credit card needed: AVNET Silica will standard invoice Azure consumption over SAP every month AVNET Silica will help to set up the Azure subscriptions, set the consumption limit and the access credentials / levels AVNET Silica will provide a detailed monthly Azure consumption report per service and per day AVNET Silica is supporting together with Microsoft Azure architects the projects on industrial OEM level 59
60 AVNET: Contact us! For Azure Sphere topics worldwide: For Microsoft Embedded / IoT topics in Europe: Microsoft@Silica.com 60
61 Microsoft Azure Sphere Overview Martin Grossen, Line Manager Microsoft Embedded / IoT Europe martin.grossen@avnet.eu 5. June 2018
Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationBuilding secure devices on the intelligent edge with Azure Sphere. Paul Foster, Microsoft Dr Hassan Harb, E.On
Building secure devices on the intelligent edge with Azure Sphere Paul Foster, Microsoft Dr Hassan Harb, E.On Microcontrollers (MCUs) low-cost, single chip computers 9 BILLION new MCU devices built and
More informationAzure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft
Azure Sphere: Fitting Linux Security in 4 MiB of RAM Ryan Fairfax Principal Software Engineering Lead Microsoft Agenda o o o o Intro to Azure Sphere Kernel Customizations User mode services / App Model
More informationBuilding a Better Mousetrap:
Building a Better Mousetrap: Deploying and Managing IoT Solutions for ITPros Anthony Bartolo Sr. Cloud Advocate Microsoft #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Engage customers Optimize operations p Connected
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationBCM4343W IoT Starter Kit Getting Started Guide Version 2.1
BCM4343W IoT Starter Kit Getting Started Guide Version 2.1 Page 1 Copyright 2017 Avnet, Inc. AVNET, Reach Further, and the AV logo are registered trademarks of Avnet, Inc. All other brands are the property
More informationMicrosoft's IoT Vision and Roadmap. Sam George Director, Azure IoT
Microsoft's IoT Vision and Roadmap Sam George Director, Azure IoT IoT Enables a Digital Feedback Loop IoT Enables a Digital Feedback Loop The benefits are profound IoT enables a digital feedback loop that
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More informationLive Demo: A New Hardware- Based Approach to Secure the Internet of Things
SESSION ID: CCS-W04 Live Demo: A New Hardware- Based Approach to Secure the Internet of Things Cesare Garlati Chief Security Strategist prpl Foundation @CesareGarlati Securing the Internet of (broken)
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Senior Technical Marketing Manager Shenzhen / ARM Tech Forum / The Ritz-Carlton June 14, 2016 Agenda Introduction Security Foundations on Cortex-A
More informationSecurity of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices
Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security
More informationBidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi
Bidirectional wireless communication between IBM Cloud and Bluetooth Low Energy peripherals through SimpleLink Wi-Fi 30.7B connected devices by 2020, 75.4B by 2025 Top IoT concerns Security Complex standards
More informationArduCAM CC3200 UNO board
ArduCAM CC3200 UNO board User Guide Rev 1.2, Mar 2017 Table of Contents 1 Introduction... 2 2 Features... 3 3 Pin Definition... 4 4 Getting Started CC3200 with Energia... 5 4.1 Out of the Box Test... 5
More informationSo you think developing an SoC needs to be complex or expensive? Think again
So you think developing an SoC needs to be complex or expensive? Think again Phil Burr Senior product marketing manager CPU Group NMI - Silicon to Systems: Easy Access ASIC 23 November 2016 Innovation
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationAKAMAI CLOUD SECURITY SOLUTIONS
AKAMAI CLOUD SECURITY SOLUTIONS Whether you sell to customers over the web, operate data centers around the world or in the cloud, or support employees on the road, you rely on the Internet to keep your
More informationARM mbed Technical Overview
ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application
More informationOpen Source in Automotive Infotainment
Open Source in Automotive Infotainment Taeyong Kim (ty.kim@windriver.com) Services & Solutions Wind River Systems 2015 Wind River. All Rights Reserved. Why using Open Source in IoT? Internet of Things
More informationLaunch Smart Products With End-to-End Solutions You & Your Customers Can Trust
Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,
More informationIoT Edge within the IoT Framework
IoT Edge within the IoT Framework Axel Dittmann Diplom-Betriebswirt (FH) Diplom-Wirtschaftsinformatiker (FH) Global Technical Solution Specialist IOT CISSP, MCP Twitter: @DittmannAxel Waves of Innovation
More informationEMBEDDED SYSTEMS READY TO USE LECTURE MATERIALS FOR UNDERGRADUATES
EMBEDDED SYSTEMS READY TO USE LECTURE MATERIALS FOR UNDERGRADUATES INTRODUCTION 12 WEEK COURSE OUTLINE (1/2) 1.) Introduction What are embedded systems Characteristics Sample Market Segments The IoT Era
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationThe Zentri Secure IoT Platform
The Zentri Secure IoT Platform Zentri s Secure IoT Platform empowers industrial, commercial, and consumer product companies to securely build, launch, manage, and scale cloud-connected products. With Zentri,
More informationBeyond TrustZone PSA. Rob Coombs Security Director. Part1 - PSA Tech Seminars Arm Limited
Beyond TrustZone PSA Rob Coombs Security Director Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security analyses Summary
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationBeyond TrustZone Part 1 - PSA
Beyond TrustZone Part 1 - PSA Rob Coombs Security Director, Arm Arm Tech Symposia 2017, Hsinchu Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat models & security
More informationOffense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent
Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream
More informationKillTest *KIJGT 3WCNKV[ $GVVGT 5GTXKEG Q&A NZZV ]]] QORRZKYZ IUS =K ULLKX LXKK [VJGZK YKX\OIK LUX UTK _KGX
KillTest Q&A Exam : AZ-300 Title : Microsoft Azure Architect Technologies Version : DEMO 1 / 9 1.Topic 1, Case Study: 1 Label Maker app Requirements Data You identify the following requirements for data
More information$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales
WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:
More informationDelivering High-mix, High-volume Secure Manufacturing in the Distribution Channel
Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1
More informationParticle E Series Cloud-integrated hardware platform for cellular IoT devices
Particle E Series Cloud-integrated hardware platform for cellular IoT devices Particle E Series modules 36.0 x 43.0 x 4.6 mm World s first fully-integrated cellular hardware platform with out-of-box Cloud
More informationATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS
PARTNER BRIEF ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS INTRODUCTION Attivo Networks has partnered with McAfee to detect real-time in-network threats and to automate incident response
More informationProduct specification
MJIOT-AMB-03 Product specification 1 MJIOT-AMB-03module appearance 2 目录 1. Product overview...4 1.1 Characteristic... 5 1.2 main parameters...6 1.2 Interface definition... 7 2. appearance and size... 8
More information3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse
3 Software Stacks for IoT Solutions Ian Skerrett Eclipse Foundation @ianskerrett Copyright 2016 The Eclipse Foundation. All Rights Reserved Eclipse Foundation Not-for-profit open source foundation responsible
More informationRenesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development
Renesas Synergy MCUs Build a Foundation for Groundbreaking Integrated Embedded Platform Development New Family of Microcontrollers Combine Scalability and Power Efficiency with Extensive Peripheral Capabilities
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationThe challenge with IoT
1 Agenda The challenge with IoT Sensor to Cloud solution Sensor to Cloud system details SimpleLink Sub-1GHz hardware & software solution Getting started 2 The challenge with IoT We are trying to connect
More informationw w w. b a s e t r a i n i n g i n s t i t u t e. c o
Disclaimer: Some of the images and most of the data in this presentation are collected from various sources in the internet. If you notice any copyright issues or mistakes, please let me know by mailing
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationArm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited
Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased
More informationUEFI and the Security Development Lifecycle
presented by UEFI and the Security Development Lifecycle Spring 2018 UEFI Seminar and Plugfest March 26-30, 2018 Presented by Tim Lewis (Insyde Software) Agenda The Threat Is Real The Security Development
More informationPresentation's title
3 rd April 2017 B03 -In-vehicle technology enabler Presentation's title Dominique Bolignano CEO Prove & Run dominique.bolignano@provenrun.com Introducing myself and Prove & Run Dominique Bolignano, previously
More informationCypress PSoC 6 Microcontrollers
Cypress PSoC 6 Microcontrollers Purpose-Built for the Internet of Things WWW.CYPRESS.COM/PSOC6 Unmatched Solutions for the Internet of Things EMBEDDED IN TOMORROW The IoT is exploding, with more than 30
More informationCybersecurity with Automated Certificate and Password Management for Surveillance
Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to
More informationHEXIWEAR COMPLETE IOT DEVELOPMENT SOLUTION
HEXIWEAR COMPLETE IOT DEVELOPMENT SOLUTION NXP SEMICONDUCTORS PUBLIC THE ONLY SUPPLIER TO PROVIDE COMPLETE IoT SOLUTIONS DSPs, MCUs & CPUs Suite of Sensors NFC, BLE, Thread, zigbee, sub-ghz Wireless Interconnects
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationARM mbed Reference Designs
ARM mbed Reference Designs Steve Ogborne Senior Engineer Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Contents Intro Smart City Sub-GHz Reference Design Wi-Fi Reference
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationEDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity
More informationARM TrustZone for ARMv8-M for software engineers
ARM TrustZone for ARMv8-M for software engineers Ashok Bhat Product Manager, HPC and Server tools ARM Tech Symposia India December 7th 2016 The need for security Communication protection Cryptography,
More informationOberon M2M IoT Platform. JAN 2016
Oberon M2M IoT Platform JAN 2016 www.imgtec.com Contents Iot Segments and Definitions Targeted Use Cases for IoT Oberon targeted use cases IoT Differentiators IoT Power Management IoT Security Integrated
More informationReal-Time Systems and Intel take industrial embedded systems to the next level
Solution brief Industrial IoT (IIoT) Embedded Software and Systems Real-Time Systems and Intel take industrial embedded systems to the next level Innovative hypervisor and partitioning software increases
More informationBuild the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM
Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Agenda Linaro Linaro s IoT efforts Demo Business Models Design and sell x86 chips 2016 $59.5Bn Revenue Sells
More informationThe Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018
The Software of Things T Y S O N T U T T L E C E O S I L I C O N L A B S A S P E N C O R E C E O S U M M I T S H E N Z H E N 8 N O V E M B E R 2018 Most technology we ve built so far was for the Internet
More informationTI SimpleLink dual-band CC1350 wireless MCU
TI SimpleLink dual-band CC1350 wireless MCU Sub-1 GHz and Bluetooth low energy in a single-chip Presenter Low-Power Connectivity Solutions 1 SimpleLink ultra-low power platform CC2640: Bluetooth low energy
More informationDEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise
DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS Security Without Compromise CONTENTS INTRODUCTION 1 SECTION 1: STRETCHING BEYOND STATIC SECURITY 2 SECTION 2: NEW DEFENSES FOR CLOUD ENVIRONMENTS 5 SECTION
More informationPartner Center: Secure application model
Partner Center: Secure application model The information provided in this document is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including
More informationCopyright 2017 Samsung. All Rights Reserved. O-Hoon Kwon, Ph.D. Samsung Electronics
1 Copyright 2017 Samsung. All Rights Reserved. O-Hoon Kwon, Ph.D. Samsung Electronics Intro Tizen Linux kernel based Embedded OS for wide range of devices, where Mobile, Wearable, TV are maintained as
More informationNXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018
NXP MICROCONTROLLER INNOVATION CLOUD CONNECTIVITY WITH AWS & LPC54018 JUNE 2018 PUBLIC AGENDA MCU Introduction Cloud Connectivity Applications and challenges we re solving together Introducing Amazon FreeRTOS
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More informationDeveloping ASP.NET MVC 4 Web Applications
Developing ASP.NET MVC 4 Web Applications Course 20486B; 5 days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationSUSE Linux Entreprise Server for ARM
FUT89013 SUSE Linux Entreprise Server for ARM Trends and Roadmap Jay Kruemcke Product Manager jayk@suse.com @mr_sles ARM Overview ARM is a Reduced Instruction Set (RISC) processor family British company,
More informationEmbedded System Project (521423S) - Specifications
Embedded System Project (521423S) - Specifications Design phases power consumption, environment etc. partitioning, basic solutions System requirements Sketch of hardware Sketch of software operation procedures
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationZatara Series ARM ASSP High-Performance 32-bit Solution for Secure Transactions
1 ARM-BASED ASSP FOR SECURE TRANSACTIONS ZATARA SERIES 32-BIT ARM ASSP PB022106-1008 ZATARA SERIES ADVANTAGE SINGLE-CHIP SOLUTION BEST FEATURE SET IN POS PCIPED PRE-CERTIFIED EMV L1 CERTIFIED TOTAL SOLUTION
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationARM Trusted Firmware Evolution HKG15 February Andrew Thoelke Systems & Software, ARM
ARM Trusted Evolution HKG15 February 2015 Andrew Thoelke Systems & Software, ARM 1 ARM Trusted for 64-bit ARMv8-A A refresher Standardized EL3 Runtime For all 64-bit ARMv8-A systems Reducing porting and
More informationISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems
ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built
More informationEmbedded Hardware and Software
Embedded Hardware and Software Saved by a Common Language? Nithya A. Ruff, Director, Product Marketing 10/11/2012, Toronto Synopsys 2012 1 Synopsys Industry Leadership $1,800 $1,600 $1,400 $1,200 $1,000
More informationpcduino V3B XC4350 User Manual
pcduino V3B XC4350 User Manual 1 User Manual Contents Board Overview...2 System Features...3 Single-Board Computer Configuration......3 Pin Assignments...4 Single-Board Computer Setup...6 Required Hardware...6
More informationDevice to Cloud. Software Hardware Know How
Device to Cloud Software Hardware Know How Who we are q Innovative Australian based company working in Embedded Bluetooth and Wi-Fi for more than 16 years q World leading expertise in embedded Bluetooth
More informationSICS Software Week, October 2014
to Fog Securing the Edge SICS Software Week, October 2014 Iain Davidson Digital Networking iain.davidson@freescale.com 1 IoT Landscape Multi-market opportunity Wellbeing/Health Transport Energy Industrial
More informationEmbedded Linux With Raspberry Pi IOT
Embedded Linux With Raspberry Pi IOT Module 1 : Raspberry Pi Set up & Configurations Program Raspberry Pi : a credit-card sized computer Python programming for Raspberry Pi Interacting and configuring
More informationKinetis SDK Release Notes for the TWR-K24F120M Tower System Module
Freescale Semiconductor Document Number: KSDKK24FN256RN Release Notes 1.0.0, 08/2014 Kinetis SDK Release Notes for the TWR-K24F120M Tower System Module 1 Overview These are the release notes for the TWR-K24F120M
More informationF5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016
F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication
More informationNFC Framework and NT3H1201 Device Driver v1.1
NFC Framework and NT3H1201 Device Driver v1.1 Quickstart Guide for ARIS board All information contained in these materials, including products and product specifications, represents information on the
More informationNew STM32WB Series MCU with Built-in BLE 5 and IEEE
New STM32WB Series MCU with Built-in BLE 5 and IEEE 802.15.4 Make the Choice of STM32WB Series The 7 keys points to make the difference 2 Open 2.4 GHz radio Multi-protocol Dual-core / Full control Ultra-low-power
More informationCOURSE 20486B: DEVELOPING ASP.NET MVC 4 WEB APPLICATIONS
ABOUT THIS COURSE In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools and technologies. The focus will be on coding activities that enhance the
More informationBluetooth Smart Development with Blue Gecko Modules. Mikko Savolainen October 2015
Bluetooth Smart Development with Blue Gecko Modules Mikko Savolainen October 2015 Agenda Bluetooth & the IoT BGM111 Bluetooth Smart Module Blue Gecko Bluetooth Smart Software Software Development Flow
More informationBUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology
BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS Informed by the National Institute of Standards and Technology ebook BUILDING APPLICATION SECURITY INTO PRODUCTION CONTAINER ENVIRONMENTS
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationAdafruit Feather nrf52840 Express
Adafruit Feather nrf52840 Express PRODUCT ID: 4062 The Adafruit Feather nrf52840 Express is the new Feather family member with Bluetooth Low Energy and native USB support featuring the nrf52840! It's our
More informationDeveloping ASP.NET MVC 5 Web Applications
Developing ASP.NET MVC 5 Web Applications Course 20486C; 5 days, Instructor-led Course Description In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework tools
More information趙庸鎭 (Cho, Yong Jin)
Evolution to OS of Everything Tizen Micro profile for low-end IoT devices 趙庸鎭 (Cho, Yong Jin) drajin.cho@samsung.com Software Center, Samsung Elec. Contents Part I. OS of Everything in IoT Part II. Tizen
More informationHands-On Workshop: ARM mbed : From Rapid Prototyping to Production
Hands-On Workshop: ARM mbed : From Rapid Prototyping to Production FTF-SDS-F0107 Michael Norman, Martin Kojtal A P R. 2 0 1 4 TM External Use Agenda What is mbed? mbed Hardware mbed Software mbed Tools
More informationMYD-JA5D2X Development Board
MYD-JA5D2X Development Board MYC-JA5D2X CPU Module as Controller Board 500MHz Atmel SAMA5D26/27 ARM Cortex-A5 Processor 256MB DDR3 SDRAM, 256MB Nand Flash, 4MB Data FLASH, 64KB EEPROM Serial ports, USB,
More informationDeveloping ASP.NET MVC 4 Web Applications
Developing ASP.NET MVC 4 Web Applications Duration: 5 Days Course Code: 20486B About this course In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5
More informationWireless Connectivity Options for IoT. By: MIST Makers John Varela and Nicholas Landy
Wireless Connectivity Options for IoT By: MIST Makers John Varela and Nicholas Landy Outline Introduction to the Internet of Things (IoT) Wireless Communication in IoT Current Standards IEEE 802.11 (Wi-
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationWHY APPLICATIONS ARE STILL DRAINING OUR BATTERIES and how we can help. Aaron Schulman & Sachin Katti
WHY APPLICATIONS ARE STILL DRAINING OUR BATTERIES and how we can help. Aaron Schulman & Sachin Katti We cannot rely on improvements in battery technology In past 30 years: only 4x improvement in energy
More information